User Authentication Based on Keystroke Dynamics

被引:12
|
作者
Das, Rajat Kumar [1 ]
Mukhopadhyay, Sudipta [1 ]
Bhattacharya, Puranjoy [2 ]
机构
[1] IIT Kharagpur, Dept E & ECE Engn, Kharagpur, W Bengal, India
[2] Intel Technol India Ltd, Bangalore, Karnataka, India
关键词
Behavioural biometric; Continuous authentication; Free text; Gaussian mixture model (GMM); Hold time; Latency time; Keystroke dynamics; Neural network (NN); IDENTITY; IDENTIFICATION;
D O I
10.1080/03772063.2014.914686
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a technique to verify user identity using keystroke dynamics from short text, namely the computer login string. The keystroke behavioural pattern is obtained when a person types with a QWERTY keyboard. Two features hold time of an individual key and the latency of the consecutive keystrokes is used for authentication. Using a small training sample, accuracies of 90% and 99% are achieved for the data-set of 220 login strings per user (40 strings from legal user +180 strings from nine intruders) using Gaussian mixture model and two-layer feed-forward neural network, respectively, as classifier. The paper then proceeds to a comprehensive study to explain how the accuracy varies with the length of the input string and with negative data in the training set.
引用
收藏
页码:229 / 239
页数:11
相关论文
共 50 条
  • [1] User classiflcation for keystroke dynamics authentication
    Hocquet, Sylvain
    Ramel, Jean-Yves
    Cardot, Hubert
    [J]. ADVANCES IN BIOMETRICS, PROCEEDINGS, 2007, 4642 : 531 - +
  • [2] A Bioinformatics Based Approach to User Authentication via Keystroke Dynamics
    Revett, Kenneth
    [J]. INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS, 2009, 7 (01) : 7 - 15
  • [3] Anomaly Detection Approach to Keystroke Dynamics Based User Authentication
    Ivannikova, Elena
    David, Gil
    Hamalainen, Timo
    [J]. 2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, : 885 - 889
  • [4] Keystroke Dynamics Based User Authentication using Numeric Keypad
    Saini, Baljit Singh
    Kaur, Navdeep
    Bhatia, Kamaljit Singh
    [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING (CONFLUENCE 2017), 2017, : 25 - 29
  • [5] Fingerprint Based Authentication System with Keystroke Dynamics for Realistic User
    Kumar, G. Vinoth
    Prasanth, K.
    Raj, S. Govinth
    Sarathi, S.
    [J]. SECOND INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET 2014), 2014, : 206 - 209
  • [6] A machine learning approach to keystroke dynamics based user authentication
    Revett, Kenneth
    Gorunescu, Florin
    Gorunescu, Marina
    Ene, Marius
    de Magalhaes, Sergio Tenreiro
    Dinis Santos, Henrique M.
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2007, 1 (01) : 55 - 70
  • [7] A bioinformatics based approach to user authentication via keystroke dynamics
    Kenneth Revett
    [J]. International Journal of Control, Automation and Systems, 2009, 7 : 7 - 15
  • [8] A Comparison of Keystroke Dynamics Techniques for User Authentication
    Anusas-amornkul, Tanapat
    Wangsuk, Kasem
    [J]. 2015 INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC), 2015, : 45 - 49
  • [9] The reliability of user authentication through keystroke dynamics
    Douhou, Salima
    Magnus, Jan R.
    [J]. STATISTICA NEERLANDICA, 2009, 63 (04) : 432 - 449
  • [10] User authentication method based on keystroke dynamics and mouse dynamics using HDA
    Yutong Shi
    Xiujuan Wang
    Kangfeng Zheng
    Siwei Cao
    [J]. Multimedia Systems, 2023, 29 : 653 - 668